Haroon meer public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
ThinkstScapes

Jacob Torrey, research@thinkst.com, haroon meer, marco slaviero

Unsubscribe
Unsubscribe
Monthly
 
The ThinkstScapes podcast aims to distill and disseminate the cybersecurity research published worldwide. Our researchers track and review hundreds and thousands of talks (so you don't have to) and then bring this to you in small, digestible chunks.
  continue reading
 
Loading …
show series
 
Revealing more than anticipated, and preventing prying eyes PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound Man Zhou, Shuao Su, Qian Wang, Qi Li, Yuting Zhou, Xiaojing Ma, and Zhengxiong Li [Paper] ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks Minxue Tang, Anna Dai…
  continue reading
 
LLMs ain't making life any easier Abusing Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs Tsung-Yin Hsieh, Ben Nassi, Vitaly Shmatikov, and Eugene Bagdasaryan [Slides] [Paper] [Code] Tree of Attacks: Jailbreaking Black-Box LLMs Automatically Anay Mehrotra, Manolis Zampetakis, Paul Kassianik, Blaine Nelson, Hyrum Anderson, Y…
  continue reading
 
Cryptography still isn’t easy certmitm: automatic exploitation of TLS certificate validation vulnerabilities Aapo Oksman [Slides] [Code] [Video] Escaping Phishermen Nets: Cryptographic Methods Unveiled in the Fight Against Reverse Proxy Attacks Ksandros Apostoli [Blog] mTLS: When certificate authentication is done wrong Michael Stepankin [Slides] […
  continue reading
 
Privacy in the modern era IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation Erik Rye and Robert Beverly [Slides] [Paper] [Code] Device Tracking via Linux’s New TCP Source Port Selection Algorithm Moshe Kol, Amit Klein, and Yossi Gilad [Code] [Paper] zk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Iden…
  continue reading
 
Smashing Web3 transaction simulations for fun and profit Tal Be'ery and Roi Vazan [Blog] [Video] Not what you've signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection Kai Greshake, Sahar Abdelnabi, Shailesh Mishra, Christoph Endres, Thorsten Holz, and Mario Fritz [Paper] [Code] [Demo Website] Using ZK Pro…
  continue reading
 
Hacking the Cloud with SAML Felix Wilhelm [Slides] [Video] Announcing GUAC, a great pairing with SLSA (and SBOM)! Brandon Lum, Mihai Maruseac, Isaac Hepworth, Google Open Source Security Team [Blog] [Code] [Presentation] We sign code now William Woodruff [Blog] [Code] [Video] Knockout Win Against TCC - 20+ NEW Ways to Bypass Your MacOS Privacy Mech…
  continue reading
 
Analyzing the Feasibility and Generalizability of Fingerprinting Internet of Things Devices Dilawer Ahmed, Anupam Das, and Fareed Zaffar [Code] [Paper] Watching the Watchers: Practical Video Identification Attack in LTE Networks Sangwook Bae, Mincheol Son, Dongkwan Kim, CheolJun Park, Jiho Lee, Sooel Son, and Yongdae Kim [Website] [Paper] [Video] C…
  continue reading
 
I am become loadbalancer, owner of your network Nate Warfield [Slides] Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones Jiska Classen, Alexander Heinrich, Robert Reith, and Matthias Hollick [Slides] [Paper] AirTag of the Clones: Shenanigans with Liberated Item Finders Thomas Roth, Fabian Freyer, Matthias Hollick, and Jisk…
  continue reading
 
Hyntrospect: a fuzzer for Hyper-V devices Diane Dubois [Slides] [Paper] [Code] [Video] Put an io_uring on it: Exploiting the Linux Kernel Valentina Palmiotti [Blog] The AMD Branch (Mis)predictor: Where No CPU has Gone Before Pawel Wieczorkiewicz [Blog part 1] [Blog part 2] Dynamic Process Isolation Martin Schwarzl, Pietro Borrello, Andreas Kogler, …
  continue reading
 
Sponge Examples: Energy-Latency Attacks on Neural Networks Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert Mullins, and Ross Anderson [Slides] [Paper] [Video] How to Use Cheated Cryptography to Overload a Server Szilárd Pfeiffer [Slides] Bestie: Very Practical Searchable Encryption with Forward and Backward Security Tuanyang Chen…
  continue reading
 
Introduction Episode 1 - 2021/Q3 Thinkst Trends and Takeaways is a show released in conjunction with ThinkstScapes, a written quarterly review of information security research published in both industry and academic venues. Thinkst Labs allocates time to tracking industry research so you don’t have to, specifically looking for novel and unusual wor…
  continue reading
 
Loading …

Quick Reference Guide